Curriculum

  1. 1

    Book Preview

    1. Hands-on Cryptography with Python Free preview
  2. 2

    Introduction

    1. (Included in full purchase)
  3. 3

    Chapter 1 : Platform Setup and Installation

    1. (Included in full purchase)
  4. 4

    Chapter 2 : Introduction to Cryptography

    1. (Included in full purchase)
  5. 5

    Chapter 3 : Symmetric Key Cryptography

    1. (Included in full purchase)
  6. 6

    Chapter 4 : Asymmetric Key Cryptography

    1. (Included in full purchase)
  7. 7

    Chapter 5 : Hashing

    1. (Included in full purchase)
  8. 8

    Chapter 6 : Message Integrity

    1. (Included in full purchase)
  9. 9

    Chapter 7 : Miscellaneous Crypto Schemes

    1. (Included in full purchase)
  10. 10

    Chapter 8 : Security is Only as Strong as the Weakest Link

    1. (Included in full purchase)
  11. 11

    Chapter 9 : TLS Communication

    1. (Included in full purchase)
  12. 12

    Chapter 10 : Latest Trends in Cryptography

    1. (Included in full purchase)
  13. 13

    INDEX

    1. (Included in full purchase)

About the course

Cryptography is the backbone of modern digital security, and Python makes it accessible for everyone. Hands-on Cryptography with Python takes readers from foundational concepts to advanced cryptographic systems, equipping them with both theoretical understanding and practical implementation skills using Python. You’ll begin with setting up the platform and Installation and move on to understanding the basics of cryptography—exploring classic ciphers, their evolution, and their role in secure communication. Next, you’ll advance to Symmetric Key Cryptography and Asymmetric Key Cryptography, learning how to implement encryption algorithms step-by-step with Python. As you progress, you’ll dive into essential cryptographic components like Hashing and Message Integrity, enabling you to safeguard data and verify its authenticity. The book then introduces miscellaneous cryptographic schemes and highlights the principle that “Security is Only as Strong as the Weakest Link”, encouraging you to identify and address vulnerabilities. Toward the final stages, you’ll gain hands-on expertise in TLS Communication, the backbone of secure data exchange on the web. The journey culminates with an exploration of current trends in cryptography, including lightweight cryptography and post-quantum solutions, ensuring you stay ahead in this ever-evolving field.

About the Author

Md Rasid Ali is a seasoned cryptography and security expert specializing in firmware development for resource-constrained devices. Currently a Senior Engineer at Qualcomm Inc., Rasid focuses on Root-of-Trust (RoT) firmware and cryptographic protocol development. Beyond his professional work, he actively collaborates with research institutions on advanced topics such as Lightweight Cryptography and Post-Quantum Cryptography, bridging the gap between industry and academia. His work fosters innovation and contributes to the ongoing evolution of cryptographic technologies.